k-Anonymity in Databases with Timestamped Data
暂无分享,去创建一个
Sushil Jajodia | Claudio Bettini | Xiaoyang Sean Wang | Sergio Mascetti | C. Bettini | S. Jajodia | X. Wang | S. Mascetti
[1] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[2] Sushil Jajodia,et al. Temporal Databases: Theory, Design, and Implementation , 1993 .
[3] Sushil Jajodia,et al. Time Granularities in Databases, Data Mining, and Temporal Reasoning , 2000, Springer Berlin Heidelberg.
[4] Curtis E. Dyreson,et al. A Glossary of Time Granularity Concepts , 1997, Temporal Databases, Dagstuhl.
[5] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[6] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[7] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..